After reading the Bug 998844, I knew that Mozilla Firefox had supported a portable font mode since 32.0, but it was only enabled on Android, so now I use –enable-bundled-fonts to enable this feature for desktop firefox, here is the prebuilt test edition’s TEST LINK, of course, I haven’t applied most optimization for the test edition.

You can put some fonts to firefox/fonts directory to check whether the feature is effective.

And another thing, I try to add Google GEO API Key and Google Oauth API Key to this edition, and the custom build editions have lacked these keys for a long time, which cause some functions not to work. You can try the GEO link1 and GEO link2 to test Google GEO API. And you also can try to use Firefox Hello service import Contacts to test Google Oauth API.

Additionally, Mozilla has provided a new about:config option dom.ipc.plugins.flash.disable-protected-mode to configure Flash protected mode off since 35.0, and you can set it to true to test it. You can read the details from Bug 1108035 and Bug 1112709, I also use the Bug 1112709 patch.

I plan to add these features to my 35.x release edition, and after my 35.0 is finished, I will check it in order to make it pass virus total test, so that will cost me some time and may decrease some performance.

I searched the type in Mozilla Bugzilla, it seemed Fx33 changes limited the Dual GPU type, which will disable some features and they caused some issues, you can see in Bug 1097321. It is fixed in Fx37, and I try to ask someone who has the issue use the edition, which solved their problems.

Maybe the custom builders should consider the Bug 1097321 patch next edition.

And upload firefox.exe to virus total to detect it again, here is the link, oh, no one Anti-virus software report it a virus!How mad! What do you do for MSVC2013 PGO!

And another module is webapp-uninstaller.exe ( McAfee-GW-Edition and Symantec reported ), which is generated by NSIS ( I can’t do anything for NSIS ), and it is the same with the official edition, but why the Anti-virus software didn’t report official edition’s webapp-uninstaller.exe?
The answer is that official’s webapp-uninstaller.exe is signed. Can the 3rd build sign it? You can if you have bought the expensive signed certificate!
So I try to adopt a hacker method to pass webapp-uninstaller.exe check. From the link, I know a module’s signed certificate is regular, so I can copy official’s signed certificate to my build’s webapp-uninstaller.exe, and this is the patched webapp-uninstaller.exe virus total report. You can see this will pass McAfee-GW-Edition and Symantec, and only AVG reported it as Mozilla Corporation. Of course it is correct, because I only copy the signed certificate and applying signed certificate to another different module can cause certificate signed fault, but passing the Antivirus test is enough.

So I copy two modified modules to my build, package them to 7zip, and the virus total report is here. It’s the same with the words above.

In the end, it is the Anti-virus software false positives. I upload the modified 34.0 x86 edition ( only modified firefox.exe and webapp-uninstaller.exe ) to here. Based on the analysis above, I won’t provide 34.0.5 x86 modified edition.